Skip to main content
Top

2016 | OriginalPaper | Chapter

Forget About Being Forgotten

From the Right to Oblivion to the Right of Reply

Authors : Yod-Samuel Martin, Jose M. del Alamo

Published in: Data Protection on the Move

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

User concerns about the dissemination and impact of their digital identity have led to the spread of privacy-enhancing and reputation-management technologies. The former allow data subjects to decide the personal information they want to disclose in the limited scope of a particular transaction. The latter help them adjust the visibility of the information disclosed and tune how other people perceive it. However, as the sources of personal information are growing without their control, and both original and deceptive data coexist, it is increasingly difficult for data subjects to govern the impact of their personal information and for the information consumers to grasp its trustworthiness so as to separate the wheat from the chaff. This paper analyses the aforementioned risks and presents a protocol, an architecture, and a business approach supporting both data subjects in replying to the information linked to them and consumers in gaining opportune access to these replies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
As pointed by Jennifer Stoddart (Canada’s Privacy Commissioner) in Office of the Privacy Commissioner of Canada, “Protect Your Personal Information Because the Internet Never Forgets, Privacy Commissioner of Canada Says—January 27, 2011.”
 
2
Some famous, traditional examples include Stacy Snyder’s and Andrew Feldmar’s cases, gathered in Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age, chap. 1 Failing to Forget the “Drunken Pirate.”
 
3
Quinn, “Facebook Costing 16-34s Jobs in Tough Economic Climate.”
 
4
Wisniewski, Lipford, and Wilson, “Fighting for My Space.”
 
5
Besmer and Lipford, “Moving beyond Untagging: Photo Privacy in a Tagged World.”
 
6
Bornoe and Barkhuus, “Privacy Management in a Connected World: Students’ Perception of Facebook Privacy Settings.”
 
7
Tokunaga, “Social Networking Site or Social Surveillance Site? Understanding the Use of Interpersonal Electronic Surveillance in Romantic Relationships.”
 
8
Humphreys, Gill, and Krishnamurthy, “How Much Is Too Much? Privacy Issues on Twitter.”
 
9
Pesce et al., “Privacy Attacks in Social Media Using Photo Tagging Networks.”
 
10
E.g.: abouteveryone.com, Topix, or the so-called “confessions board” sites which specifically target college students such as JuicyCampus, CollegeACB, LittleGossip, etc. For a review of the evolution of these sites and a discussion from the perspective of US defamation laws, see Schorr, “Malicious Content on the Internet: Narrowing Immunity Under the Communications Decency Act.”
 
11
“Identity porn” is related, but slightly different, to the better-known concept of “revenge porn”. Both refer to non-consensual dissemination of pornographic material depicting the data subject, but the latter emphasizes a specific motivation of a discloser who had been previously involved in a sexual relationship with the data subject; while the former focuses on scenarios where these contents published are also linked to the data subject’s profile and identity attributes (whoever the disclosers and whichever their motivations might be). See Stroud, “The Dark Side of the Online Self: A Pragmatist Critique of the Growing Plague of Revenge Porn.”
 
12
Examples of existing of defunct sites that either foster or are frequently used for these practices include Is Anyone Up?, UGotPosted, Is Anybody Down?, Pink Meth, Texxxan.com, and MyEx.com.
 
13
E.g.: Zoominfo, Pipl, 123people, Yasni, AnyWho, peekyou.
 
14
Brennecke, Mandl, and Womser-Hacker, “The Development and Application of an Evaluation Methodology for Person Search Engines.”
 
15
Werbin, “Auto-Biography: On the Immanent Commodification of Personal Information.”
 
16
Mantelero, “The EU Proposal for a General Data Protection Regulation and the Roots of the ‘Right to be Forgotten.’”
 
17
For a comprehensive review of the Right to be Forgotten, see Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age.
 
18
Squicciarini, Shehab, and Paci, “Collective Privacy Management in Social Networks.”
 
19
Squicciarini, Shehab, and Wede, “Privacy Policies for Shared Content in Social Network Sites.”
 
20
Kenny and Korba, “Applying Digital Rights Management Systems to Privacy Rights Management.”
 
21
Castelluccia and Kaafar, “Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet.”
 
22
Sarrouh et al., “Defamation-Free Networks through User-Centered Data Control.”
 
23
Kelbert and Pretschner, “Towards a Policy Enforcement Infrastructure for Distributed Usage Control.”
 
24
Pearson and Casassa-Mont, “Sticky Policies: An Approach for Managing Privacy across Multiple Parties.”
 
25
Diehl and Furon, “© Watermark: Closing the Analog Hole.”
 
26
Shein, “Ephemeral Data.”
 
27
Druschel, Backes, and Tirtea, “The Right to be Forgotten—between Expectations and Practice—ENISA.”
 
28
Markou, “The ‘Right to be Forgotten’: Ten Reasons Why It Should Be Forgotten.”
 
29
Thompson and Fertik, Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier.
 
30
Ilešič, JUDGMENT OF THE COURT (Grand Chamber) In Case C‑131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 February 2012, received at the Court on 9 March 2012, in the proceedings Google Spain SL, Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González, (2014).
 
31
Fujikawa, “Google Suffers New Privacy Setback in Japan.”
 
32
Court of Justice of the European Union, Opinion of Advocate General Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González (2013).
 
33
Tiffen, “Finkelstein Report: Volume of Media Vitriol in Inverse Proportion to Amount of Evidence.”
 
34
Cornwall, “It Was the First Strike of Bloggers Ever: An Examination of Article 10 of the European Convention on Human Rights as Italian Bloggers Take a Stand against the Alfano Decree.”
 
35
Werkers, Lievens, and Valcke, “A Critical Analysis of the Right of Reply in Online Media.”
 
36
Balog, Azzopardi, and de Rijke, “Resolving Person Names in Web People Search.”
 
37
Long and Shi, “Web Person Name Disambiguation by Relevance Weighting of Extended Feature Sets.”
 
38
Köpcke and Rahm, “Frameworks for Entity Matching: A Comparison.”
 
39
Jonas, “Threat and Fraud Intelligence, Las Vegas Style.”
 
40
Li, Wang, and Chen, “Identity Matching Using Personal and Social Identity Features.”
 
41
Berendsen et al., “Result Disambiguation in Web People Search.”
 
42
Jones et al., “WebFinger.”
 
43
Slatkin, “Bootstrapping WebFinger Decentralized Discovery with WebFist.”
 
44
Hansen and Hallam-Baker, “DomainKeys Identified Mail (DKIM) Service Overview.”
 
45
Ligouras, “Protecting the Social Graph: Client–side Mitigation of Cross–Site Content Forgery Attacks,” 27–29.
 
47
Greasemonkey for Mozilla Firefox (http://​www.​greasespot.​net/​) or Tampermonkey for Google Chrome, Opera Next and Safari (https://​tampermonkey.​net/​).
 
48
O’Connor, “Managing a Hotel’s Image on TripAdvisor.”
 
50
Weinberg, “An Introduction to Social Media Marketing.”
 
51
During the first year of the application of the EU data-protection rules to Google search results, only 41.5 % of the removal requests were honored. See Laursen, “Google’s Year of Forgetting [News].”
 
52
Ibid.
 
53
Ortlieb, “The Anthropologist’s View on Privacy.”
 
54
Ibid.
 
56
Hansen et al., “Privacy-Enhancing Identity Management.”
 
57
Talukder and Ahamed, “Preventing Multi-Query Attack in Location-Based Services.”
 
Literature
go back to reference Balog, Krisztian, Leif Azzopardi, and Maarten de Rijke. 2009. Resolving person names in web people search. In Weaving Services and People on the World Wide Webeaving Services and People on the World Wide Web, ed. Irwin King and Ricardo Baeza-Yates, 301–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. doi:10.1007/978-3-642-00570-1. Balog, Krisztian, Leif Azzopardi, and Maarten de Rijke. 2009. Resolving person names in web people search. In Weaving Services and People on the World Wide Webeaving Services and People on the World Wide Web, ed. Irwin King and Ricardo Baeza-Yates, 301–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. doi:10.​1007/​978-3-642-00570-1.
go back to reference Berendsen, Richard, Bogomil Kovachev, Maarten Weerkamp Nastou, Evangelia-Paraskevi de Rijke, and Wouter. 2012. Result disambiguation in web people search. In Advances in Information Retrieval, ed. Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, B. Barla Cambazoglu, Vanessa Murdock, Ronny Lempel, and Fabrizio Silvestri, 7224:146–57. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. doi:10.1007/978-3-642-28997-2. Berendsen, Richard, Bogomil Kovachev, Maarten Weerkamp Nastou, Evangelia-Paraskevi de Rijke, and Wouter. 2012. Result disambiguation in web people search. In Advances in Information Retrieval, ed. Ricardo Baeza-Yates, Arjen P. de Vries, Hugo Zaragoza, B. Barla Cambazoglu, Vanessa Murdock, Ronny Lempel, and Fabrizio Silvestri, 7224:146–57. Lecture Notes in Computer Science. Springer, Berlin, Heidelberg. doi:10.​1007/​978-3-642-28997-2.
go back to reference Besmer, Andrew, and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI ’10, 1563–1572. doi:10.1145/1753326.1753560. Besmer, Andrew, and Heather Richter Lipford. 2010. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI ’10, 1563–1572. doi:10.​1145/​1753326.​1753560.
go back to reference Brennecke, Roland, Thomas Mandl, and Christa Womser-Hacker. 2011. The development and application of an evaluation methodology for person search engines. In EuroHCIR 2011 European Workshop on Human–Computer Interaction and Information Retrieval, CEUR Workshop Proceedings, 42–45, 2011. http://ceur-ws.org/Vol-763/. Brennecke, Roland, Thomas Mandl, and Christa Womser-Hacker. 2011. The development and application of an evaluation methodology for person search engines. In EuroHCIR 2011 European Workshop on Human–Computer Interaction and Information Retrieval, CEUR Workshop Proceedings, 42–45, 2011. http://​ceur-ws.​org/​Vol-763/​.
go back to reference Castelluccia, Claude, and Mohamed Ali Kaafar. 2009. Owner-centric networking (OCN): Toward a data pollution-free internet. In 2009 Ninth Annual International Symposium on Applications and the Internet, 169–72. IEEE. doi:10.1109/SAINT.2009.34. Castelluccia, Claude, and Mohamed Ali Kaafar. 2009. Owner-centric networking (OCN): Toward a data pollution-free internet. In 2009 Ninth Annual International Symposium on Applications and the Internet, 169–72. IEEE. doi:10.​1109/​SAINT.​2009.​34.
go back to reference Court of Justice of the European Union. 2013. Opinion of Advocate general Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González. Court of Justice of the European Union. 2013. Opinion of Advocate general Jääskinen delivered on 25 June 2013 Case C-131/12 Google Spain SL Google Inc. v Agencia Española de Protección de Datos (AEPD), Mario Costeja González.
go back to reference Diehl, E., and T. Furon. 2014. © Watermark: Closing the analog hole. In 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE., 52–53. IEEE. Accessed 24 Oct 2014. doi:10.1109/ICCE.2003.1218801. Diehl, E., and T. Furon. 2014. © Watermark: Closing the analog hole. In 2003 IEEE International Conference on Consumer Electronics, 2003. ICCE., 52–53. IEEE. Accessed 24 Oct 2014. doi:10.​1109/​ICCE.​2003.​1218801.
go back to reference Hansen, Marit, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, and Michael Waidner. 2004. Privacy-enhancing identity management. Information security technical report 9(1): 35–44. doi:10.1016/S1363-4127(04)00014-7.CrossRef Hansen, Marit, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, and Michael Waidner. 2004. Privacy-enhancing identity management. Information security technical report 9(1): 35–44. doi:10.​1016/​S1363-4127(04)00014-7.CrossRef
go back to reference Ilešič, M. 2014. JUDGMENT OF THE COURT (Grand Chamber) In Case C–131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 Feb 2012, received at the Court on 9 Mar 2012, in the proceedings Google Spa, (2014). Ilešič, M. 2014. JUDGMENT OF THE COURT (Grand Chamber) In Case C–131/12, REQUEST for a preliminary ruling under Article 267 TFEU from the Audiencia Nacional (Spain), made by decision of 27 Feb 2012, received at the Court on 9 Mar 2012, in the proceedings Google Spa, (2014).
go back to reference Kelbert, Florian, and Alexander Pretschner. 2012. Towards a policy enforcement infrastructure for distributed usage control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies - SACMAT ’12, 119. New York, USA: ACM Press, 2012. doi:10.1145/2295136.2295159. Kelbert, Florian, and Alexander Pretschner. 2012. Towards a policy enforcement infrastructure for distributed usage control. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies - SACMAT ’12, 119. New York, USA: ACM Press, 2012. doi:10.​1145/​2295136.​2295159.
go back to reference Li, Jiexun, G. Alan Wang, and Hsinchun Chen. 2010. Identity Matching using personal and social identity features. Information Systems Frontiers 13(1): 101–13. doi:10.1007/s10796-010-9270-0. Li, Jiexun, G. Alan Wang, and Hsinchun Chen. 2010. Identity Matching using personal and social identity features. Information Systems Frontiers 13(1): 101–13. doi:10.​1007/​s10796-010-9270-0.
go back to reference Markou, Christiana. 2015. The ‘Right to Be Forgotten’: Ten reasons why it should be forgotten. In Reforming European Data Protection Law SE—8, ed. Serge Gutwirth, Ronald Leenes, and Paul de Hert, 20: 203–26. Law, Governance and Technology Series. Springer, Netherlands, 2015. doi:10.1007/978-94-017-9385-8_8. Markou, Christiana. 2015. The ‘Right to Be Forgotten’: Ten reasons why it should be forgotten. In Reforming European Data Protection Law SE—8, ed. Serge Gutwirth, Ronald Leenes, and Paul de Hert, 20: 203–26. Law, Governance and Technology Series. Springer, Netherlands, 2015. doi:10.​1007/​978-94-017-9385-8_​8.
go back to reference Mayer-Schönberger, Viktor. 2011. Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press. Mayer-Schönberger, Viktor. 2011. Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.
go back to reference Pearson, Siani, and Marco Casassa-Mont. 2011. Sticky policies: An approach for managing privacy across multiple parties. Computer 44(9): 60–68. doi:10.1109/MC.2011.225. Pearson, Siani, and Marco Casassa-Mont. 2011. Sticky policies: An approach for managing privacy across multiple parties. Computer 44(9): 60–68. doi:10.​1109/​MC.​2011.​225.
go back to reference Pesce, João Paulo, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media—PSOSM ’12, 1–8. New York, USA: ACM Press. doi:10.1145/2185354.2185358. Pesce, João Paulo, Diego Las Casas, Gustavo Rauber, and Virgílio Almeida. 2012. Privacy attacks in social media using photo tagging networks. In Proceedings of the 1st Workshop on Privacy and Security in Online Social Media—PSOSM ’12, 1–8. New York, USA: ACM Press. doi:10.​1145/​2185354.​2185358.
go back to reference Sarrouh, Nadim, Florian Eilers, Uwe Nestmann, and Ina Schieferdecker. 2011. Defamation-free networks through user-centered data control. In Security and Trust Management SE—12, ed. Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner, 6710: 179–93. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. doi:10.1007/978-3-642-22444-7_12. Sarrouh, Nadim, Florian Eilers, Uwe Nestmann, and Ina Schieferdecker. 2011. Defamation-free networks through user-centered data control. In Security and Trust Management SE—12, ed. Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner, 6710: 179–93. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011. doi:10.​1007/​978-3-642-22444-7_​12.
go back to reference Squicciarini, Anna Cinzia, Mohamed Shehab, and Federica Paci. 2009 Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web—WWW ’09, 521. New York, USA: ACM Press, 2009. doi:10.1145/1526709.1526780. Squicciarini, Anna Cinzia, Mohamed Shehab, and Federica Paci. 2009 Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web—WWW ’09, 521. New York, USA: ACM Press, 2009. doi:10.​1145/​1526709.​1526780.
go back to reference Talukder, Nilothpal, and Sheikh Iqbal Ahamed. 2010. Preventing multi-query attack in location-based services. In Proceedings of the Third ACM Conference on Wireless Network Security - WiSec ’10, 25. New York, USA: ACM Press, 2010. doi:10.1145/1741866.1741873. Talukder, Nilothpal, and Sheikh Iqbal Ahamed. 2010. Preventing multi-query attack in location-based services. In Proceedings of the Third ACM Conference on Wireless Network Security - WiSec ’10, 25. New York, USA: ACM Press, 2010. doi:10.​1145/​1741866.​1741873.
go back to reference Thompson, David, and Michael Fertik. 2010. Wild west 2.0: How to protect and restore your online reputation on the untamed social frontier. amacom, 2010. Thompson, David, and Michael Fertik. 2010. Wild west 2.0: How to protect and restore your online reputation on the untamed social frontier. amacom, 2010.
go back to reference Tokunaga, Robert S. 2011 Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior 27(2): 705–13. doi:10.1016/j.chb.2010.08.014. Tokunaga, Robert S. 2011 Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Computers in Human Behavior 27(2): 705–13. doi:10.​1016/​j.​chb.​2010.​08.​014.
go back to reference Weinberg, Tamar. 2009. An introduction to social media marketing. In The New Community Rules: Marketing on the Social Web, 1st ed., 1–18. O’Reilly Media, Inc. Weinberg, Tamar. 2009. An introduction to social media marketing. In The New Community Rules: Marketing on the Social Web, 1st ed., 1–18. O’Reilly Media, Inc.
go back to reference Werkers, Evi, Eva Lievens, and Peggy Valcke. 2007. A critical analysis of the right of reply in online media. In Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS’07), 181–88. IEEE, 2007. doi:10.1109/AXMEDIS.2007.11. Werkers, Evi, Eva Lievens, and Peggy Valcke. 2007. A critical analysis of the right of reply in online media. In Third International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS’07), 181–88. IEEE, 2007. doi:10.​1109/​AXMEDIS.​2007.​11.
go back to reference Wisniewski, Pamela, Heather Lipford, and David Wilson. 2012. Fighting for My Space. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems—CHI ’12, 609. New York, New York, USA: ACM Press, 2012. doi:10.1145/2207676.2207761. Wisniewski, Pamela, Heather Lipford, and David Wilson. 2012. Fighting for My Space. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems—CHI ’12, 609. New York, New York, USA: ACM Press, 2012. doi:10.​1145/​2207676.​2207761.
Metadata
Title
Forget About Being Forgotten
Authors
Yod-Samuel Martin
Jose M. del Alamo
Copyright Year
2016
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-7376-8_10

Premium Partner